Minimal-Overhead IP Security using Identity Based Encryption

نویسندگان

  • Guido Appenzeller
  • Ben Lynn
چکیده

In this paper we propose a new network layer security protocol that allows encrypted and authenticated communication between hosts. The new protocol has a number of advantages over existing protocols, including: no initial handshake to establish a connection, zero packet overhead, no per-host state and simpler key distribution. The protocol achieves these goals by using identitybased encryption to generate a secret that is shared between two hosts. We have implemented the cryptographic algorithm and the protocol and integrated them into the Linux networking stack. We analyze the security of the protocol, show that with a small modification it has the minimal possible overhead and give experimental results on its performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Logic Locking Using Hybrid CMOS and Emerging SiNW FETs

The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as the integrity maintenance of the fabricated chips. One way to protect ICs from malicious attacks is to encrypt and obfuscate the IP design by incorporating additional key gates, namely logic enc...

متن کامل

Identity-based encryption with outsourced equality test in cloud computing

We firstly combine the concepts of public key encryption with equality test (PKEET) and identity-based encryption (IBE) to obtain identity-based encryptionwith equality test (IBEET). Inheriting the advantage of IBE, IBEET can simplify the certificate management of PKEET with all messages encrypted with the receiver’s public identity. In the IBEET scheme, the receiver computes a trapdoor using t...

متن کامل

A Secure Mobile IP Registration Protocol

The wireless network develop is support mobility within the Internet at presently. The mobile Internet use Mobile IP technologies in the wireless Internet. This paper is concerned with the security aspect of the registration protocol in Mobile IP. In this paper we publish a new method use the secure-key combine minimal public-key besides produce the communication session key in mobile node regi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002